In: 2009 ICSE workshop on principles of engineering service oriented systems, pp 9–12, https://doi.org/10.1109/PESOS.2009.5068813 Bataityte K, Vassilev V, Gill OJ (2020) Ontological Foundations of Modelling Security Policies for Logical Analytics. In: Maglogiannis I, Iliadis L, Pimenidis ...
However, our analysis shows that these information types are present in the class comments of Java and Python projects. We introduce such categories to the existing taxonomies of Java and Python, and highlight them in green in Fig. 9. On the other hand, the categories such as Commented code...
which is the training. We present it in Section3.8and summarize in Table9. In FinG 1, the training was based on a presentation, while in FinG 2 the training was based on book reading. We consider that this difference does not impact our analysis. We argue that in both FinG 1 and ...
10.1109/ICSE.2005.1553590 Google Scholar Johnson B, Shneiderman B: Tree-maps: a space-filling approach to the visualization of hierarchical information structures. In Visualization, 1991. Visualization ’91, Proceedings., IEEE Conference On. IEEE, San Diego, CA, USA; 1991:284–291. Google ...